O Salem, S Vaton, A Gravey - International Journal of Network …, 2010 - Wiley Online Library
In this paper, we present the design and implementation of a new approach for anomaly detection and classification over high speed networks. The proposed approach is based first …
Internet worms are gaining ever more attention by the research community, representing one of the hot research topics in the field of network security. Our knowledge of phenomena …
JM Chambers, DA James, D Lambert, S Vander Wiel - 2006 - projecteuclid.org
Networked applications have software components that reside on different computers. Email, for example, has database, processing, and user interface components that can be …
A Chen, J Cao, L Shepp, T Nguyen - Journal of the American …, 2011 - Taylor & Francis
Counting the number of distinct elements (cardinality) in a dataset is a fundamental problem in database management. In recent years, there has been significant interest to address the …
Instant messaging (IM) systems have gained a lot of popularity in recent years. The increasing number of IM users has lured malware authors to develop more worms and …
Y Xu, W Wang - 2010 Proceedings IEEE INFOCOM, 2010 - ieeexplore.ieee.org
Correlated failures pose a great challenge for the normal functioning of large wireless networks, because an initial local failure may trigger a global sequence of related failures …
Q Wang, Z Chen, C Chen - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
Internet worm attacks pose a significant threat to network security and management. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet …
Q Wang, Z Chen, K Makki, N Pissinou… - … 2008-2008 IEEE …, 2008 - ieeexplore.ieee.org
Internet worm attacks pose a significant threat to network security. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms from the …
E Ahmed, A Clark, G Mohay - Nordic Conference on Secure IT Systems, 2009 - Springer
Monitoring unused (or on dark d efault) IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different …